
Sign up to save your podcasts
Or
In this hunting edition of the Exploring Information Security podcast, Keith Hoodlet of Bugcrowd joins me to discuss bug bounty programs.
Keith (@andMYhacks), is a solutions architect at Bugcrowd. He's also the co-host of Application Security Weekly. While Keith works at Bugcrowd, he also has a lot of experience participating in bug bounty programs. Check out his website AttackDriven.io.
In this episode we discuss:
What are bug bounty programs?
Who are security researchers.
Who is running the bug bounty program?
When should an organization implement a program.
More resources:
Jason Haddix - Bug Bounty Hunting Methodology v2
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws by Dafydd Stuttard and Marcus Pinto
[RSS Feed] [iTunes]
Sign up with your email address to receive news and updates.
We respect your privacy.
4.7
4343 ratings
In this hunting edition of the Exploring Information Security podcast, Keith Hoodlet of Bugcrowd joins me to discuss bug bounty programs.
Keith (@andMYhacks), is a solutions architect at Bugcrowd. He's also the co-host of Application Security Weekly. While Keith works at Bugcrowd, he also has a lot of experience participating in bug bounty programs. Check out his website AttackDriven.io.
In this episode we discuss:
What are bug bounty programs?
Who are security researchers.
Who is running the bug bounty program?
When should an organization implement a program.
More resources:
Jason Haddix - Bug Bounty Hunting Methodology v2
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws by Dafydd Stuttard and Marcus Pinto
[RSS Feed] [iTunes]
Sign up with your email address to receive news and updates.
We respect your privacy.
1,971 Listeners
360 Listeners
627 Listeners
14,111 Listeners
96 Listeners
367 Listeners
1,006 Listeners
7,873 Listeners
9,555 Listeners
167 Listeners
187 Listeners
314 Listeners
74 Listeners
479 Listeners
127 Listeners